Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Table of Contents
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Part 1: Getting Started with CISSP Certification
Chapter 1: (ISC)2 and the CISSP Certification
About (ISC)2 and the CISSP Certification
You Must Be This Tall to Ride This Ride (and Other Requirements)
Preparing for the Exam
Registering for the Exam
About the CISSP Examination
After the Examination
Chapter 2: Putting Your Certification to Good Use
Networking with Other Security Professionals
Being an Active (ISC)2 Member
Considering (ISC)2 Volunteer Opportunities
Becoming an Active Member of Your Local Security Chapter
Spreading the Good Word about CISSP Certification
Using Your CISSP Certification to Be an Agent of Change
Earning Other Certifications
Pursue Security Excellence
Part 2: Certification Domains
Chapter 3: Security and Risk Management
Apply Security Governance Principles
Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Compliance
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Understand Professional Ethics
Develop and Implement Documented Security Policies, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Supply Chain Management, Mergers, and Acquisitions
Establish and Manage Information Security Education, Training, and Awareness
Chapter 4: Asset Security
Classify Information and Supporting Assets
Determine and Maintain Ownership
Protect Privacy
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements
Chapter 5: Security Architecture and Engineering
Implement and Manage Engineering Processes Using Secure Design Principles
Understand the Fundamental Concepts of Security Models
Select Controls Based upon Systems Security Requirements
Understand Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-Based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices
Apply Cryptography
Apply Security Principles to Site and Facility Design
Implement Site and Facility Security Controls
Chapter 6: Communication and Network Security
Implement Secure Design Principles in Network Architectures
Secure Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks
Chapter 7: Identity and Access Management
Control Physical and Logical Access to Assets
Manage Identification and Authentication of People, Devices, and Services
Integrate Identity-as-a-Service
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Lifecycle
Chapter 8: Security Assessment and Testing
Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyze Test Output and Generate Reports
Conduct or Facilitate Security Audits
Chapter 9: Security Operations
Understand and Support Investigations
Understand Requirements for Investigation Types
Conduct Logging and Monitoring Activities
Securely Provisioning Resources
Understand and Apply Foundational Security Operations Concepts
Apply Resource Protection Techniques
Conduct Incident Management
Operate and Maintain Detective and Preventive Measures
Implement and Support Patch and Vulnerability Management
Understand and Participate in Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery (DR) Processes
Test Disaster Recovery Plans
Participate in Business Continuity (BC) Planning and Exercises
Implement and Manage Physical Security
Address Personnel Safety and Security Concerns
Chapter 10: Software Development Security
Understand and Integrate Security in the Software Development Lifecycle
Identify and Apply Security Controls in Development Environments
Assess the Effectiveness of Software Security
Assess Security Impact of Acquired Software
Define and Apply Secure Coding Guidelines and Standards
Part 3: The Part of Tens
Chapter 11: Ten Test-Planning Tips
Know Your Learning Style
Get a Networking Certification First
Register Now!
Make a 60-Day Study Plan
Get Organized and Read!
Join a Study Group
Take Practice Exams
Take a CISSP Training Seminar
Adopt an Exam-Taking Strategy
Take a Breather
Chapter 12: Ten Test-Day Tips
Get a Good Night’s Rest
Dress Comfortably
Eat a Good Meal
Arrive Early
Bring a Photo ID
Bring Snacks and Drinks
Bring Prescription and Over-the-Counter Medications
Leave Your Mobile Devices Behind
Take Frequent Breaks
Guess — as a Last Resort
Glossary
About the Authors
Advertisement Page
Connect with Dummies
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →